Sciweavers

3395 search results - page 140 / 679
» Computational Differential Privacy
Sort
View
138
Voted
TDSC
2011
14 years 8 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
117
Voted
PERCOM
2008
ACM
16 years 20 days ago
Composition and Generalization of Context Data for Privacy Preservation
This paper presents preliminary results on anonymization and obfuscation techniques to preserve users' privacy in context-aware service provisioning. The techniques are based...
Linda Pareschi, Daniele Riboni, Alessandra Agostin...
PERCOM
2007
ACM
16 years 20 days ago
Defining Strong Privacy for RFID
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is threefold: (1) We propose a simple, formal definition of strong privacy usef...
Ari Juels, Stephen A. Weis
116
Voted
CSCWD
2007
Springer
15 years 7 months ago
Digital Identity Design and Privacy Preservation for e-Learning
More and more learners tend to utilise e-learning as their learning platform. The privacy of the users’ digital identities of e-learning has become a big concern. This paper pro...
Jianming Yong
97
Voted
POLICY
2007
Springer
15 years 7 months ago
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel,...